ccna chapter1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which statement describes a characteristic of a converged network?

A single network that delivers voice, video, and data to a variety of devices.

makes it possible for users to be free to use their personal devices to access a corporate or a campus network

BYOD

the collection of globally interconnected networks

Internet

An ________is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.

Intranet

a mechanism to manage the flow of traffic based on different requirements to ensure reliable delivery of each type of traffic

QoS

type of network infrastructure that stores, retrieves, and replicates data

SAN

Which three devices are considered end devices in a network? (Choose three.)

VoIP phone security camera TelePresence endpoint

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access

What is a WAN?

a network infrastructure that provides access to other networks over a large geographic area

a network that provides safe and secure access to an organization's data to authorized people who work outside that organization

extranet

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

a network characteristic that restricts the impact of a failure on network access and allows a network to recover quickly from the failure

fault tolerance

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

spyware

a web page that can be created and edited by a group of people

wiki

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources.

technology that provides the user with a high-bandwidth connection to the Internet over a telephone line

DSL

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

the connection of devices to the Internet through the use of existing electrical wiring

Powerline Networking

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

The project ________started the development of inter-network connections using TCP/IP that has evolved into the Internet today.

arpanet

web pages easily updated and edited by a person who wants to express his or her opinions about any subject

blog

technology in which a user can get access to the Internet when connecting a cell phone to a cell phone network

cellular

technology that allows users and organizations to store data on remotely located servers on the Internet

cloud computing

tools that allow individuals to work together as a team on a project, no matter where they are located

collaboration tools

a network with the capability of delivering traffic with different requirements but with the use of the same network infrastructure

converged network

a facility used to store information originating from users or organizations

data center

What are two characteristics of a scalable network?

grows in size without impacting existing users suitable for modular devices that allow for expansion

i206871v1n2_206871.png Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?

intermediary Routers and switches are intermediary devices. End devices consist of PCs, laptops, and servers. They also include printers, VoIP phones, security cameras, and hand-held devices.

a private interconnection of LANs and WANs inside an organization that can only be accessed by organization members or by non-members with authorization

intranet

a type of network in which computers can perform the role of a server and a client at the same time

peer-to-peer network

a technology that allows people to access a website and download an audio recording delivered by someone

podcasting


Ensembles d'études connexes

Operating Systems Homework Questions

View Set

Sterile and Nonsterile Compounding

View Set

macro exam 2 study guide chap 8-12

View Set

maternity exam practice questions

View Set

Foundations of Journalism Final 12/8

View Set

Chapter 9: Information Literacy - A Road to Evidence Based Practice

View Set